Amazon EKS vs Azure Kubernetes Service

Credit to Author: Michael Langford| Date: Thu, 09 Jun 2022 00:00:00 +0000

Managed Kubernetes services help organizations deploy, configure, and manage Kubernetes clusters. This article compares two of the biggest service providers: Amazon EKS and Azure Kubernetes Services.

Read more

Cuba Ransomware Group’s New Variant Found Using Optimized Infection Techniques

Credit to Author: Don Ovid Ladores| Date: Wed, 08 Jun 2022 00:00:00 +0000

Trend Micro Research observed the resurgence of the Cuba ransomware group that launched a new malware variant using different infection techniques compared to past iterations. We discuss our initial findings in this report.

Read more

Why It’s Time to Map the Digital Attack Surface

Credit to Author: Bharat Mistry| Date: Mon, 06 Jun 2022 00:00:00 +0000

Trend Micro research reveals struggle to control cyber risks against mounting digital attack surfaces.

Read more

Tutorial: How to Build Your First Node.js gRPC API

Credit to Author: Michael Langford| Date: Sat, 04 Jun 2022 00:00:00 +0000

Compared to other API technologies like REST and GraphQL, gRPC is lightweight and exceptionally robust, thanks in large part to its use of protobufs. Interested in exploring how to build your own API? Read on to see how easy it is to do so with Node.js and gRPC.

Read more

YourCyanide: A CMD-based Ransomware With Multiple Layers of Obfuscation

Credit to Author: Ieriz Nicolle Gonzalez| Date: Thu, 02 Jun 2022 00:00:00 +0000

The Trend Micro Threat Hunting team recently analyzed a series of CMD-based ransomware variants with a number capabilities such as stealing user information, bypassing remote desktop connections, and propagating through email and physical drives.

Read more

Trend Micro Partners With Interpol and Nigeria’s EFCC for Operation Killer Bee, Takes Down Nigerian BEC Actors

Credit to Author: Paul Pajares| Date: Thu, 02 Jun 2022 00:00:00 +0000

Nigeria’s Economic and Financial Crimes Commission (EFCC) arrested three suspected scammers from Nigeria who were involved in global scamming campaigns via a sting operation that is part of Operation Killer Bee. Trend Micro provided information on the group and their modus operandi.

Read more

AvosLocker Ransomware Variant Abuses Driver File to Disable Antivirus, Scans for Log4shell

Credit to Author: Christoper Ordonez| Date: Mon, 02 May 2022 00:00:00 +0000

We found an AvosLocker ransomware variant using a legitimate antivirus component to disable detection and blocking solutions.

Read more

New Linux-Based Ransomware Cheerscrypt Targeting ESXi Devices Linked to Leaked Babuk Source Code

Credit to Author: Arianne Dela Cruz| Date: Wed, 25 May 2022 00:00:00 +0000

New findings showed that Cheerscrypt, a new Linux-based ransomware variant that compromises ESXi servers, was derived from the leaked Babuk source code. We discuss our analysis in this report.

Read more